CN109040106A - A kind of transmission control method and device of service hierarchy classification - Google Patents

A kind of transmission control method and device of service hierarchy classification Download PDF

Info

Publication number
CN109040106A
CN109040106A CN201810987401.9A CN201810987401A CN109040106A CN 109040106 A CN109040106 A CN 109040106A CN 201810987401 A CN201810987401 A CN 201810987401A CN 109040106 A CN109040106 A CN 109040106A
Authority
CN
China
Prior art keywords
service
layer
transmission control
service request
control method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810987401.9A
Other languages
Chinese (zh)
Inventor
万忠平
李佳桓
张军
范庆雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGZHOU CITY INFORMATION RESEARCH INSTITUTE Co Ltd
Original Assignee
GUANGZHOU CITY INFORMATION RESEARCH INSTITUTE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGZHOU CITY INFORMATION RESEARCH INSTITUTE Co Ltd filed Critical GUANGZHOU CITY INFORMATION RESEARCH INSTITUTE Co Ltd
Priority to CN201810987401.9A priority Critical patent/CN109040106A/en
Publication of CN109040106A publication Critical patent/CN109040106A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of transmission control methods of service hierarchy classification, comprising the following steps: receiving step: receiving the service request that user terminal is sent;Service processing step: service processing is carried out according to service request to obtain service request result, the service processing includes service fractionation, and the service splits and figure layer fractionation is split and/or serviced including service clearance;Feedback step: service request result is fed back into user terminal.The present invention also provides a kind of electronic equipment and computer readable storage medium.The transmission control method of service hierarchy classification of the invention dynamically realizes that fine-grained permission controls to shared service resource according to the permission of user, including the permission control on spatially (such as administrative region) and figure layer.

Description

A kind of transmission control method and device of service hierarchy classification
Technical field
The present invention relates to transmission control methods and dress that a kind of service retransmission method more particularly to a kind of service hierarchy are classified It sets.
Background technique
Currently, common service forwarding control and device only realize and the permission of user are authenticated and controlled, Safety verification is carried out to the request from client and permission controls.Client transmit a request to proxy server, then acts on behalf of Server obtains content from original server and returns again to client.Client must configure forwarding agency technically to access Other websites, such as Configuration Agent server address and port numbers in a browser.For the request by safety verification, continue Otherwise this calling is directly interrupted in the processing of next step, return to the state of unauthorized to client.According to the type of request user Judge whether to meet permission, the data that user's request is returned if meeting permission are not returned or returned if not meeting permission Clear data realizes the forwarding control of most basic service.
Existing technology dynamically can not provide shared service in Service Source shared procedure, according to the permission of user Fine-grained permission control is realized in source, including the permission control on spatially (such as administrative region) and figure layer.For example, by some The Map Services resource-sharing of specific region is to user, or figure layer will be specified to share to user in some Service Source.When asking The figure layer resource quantity asked is more, when service request high concurrent, if issuing original service for each figure layer, will lead to clothes Device pressure of being engaged in increases, and request speed is slow;When the shared service resource data amount of request is larger, figure layer resource returns to low efficiency; Server stress increases, and easily leads to the possibility of service blocking and service-Engine paralysis.
Summary of the invention
For overcome the deficiencies in the prior art, one of the objects of the present invention is to provide a kind of forwardings of service hierarchy classification Control method, dynamic realizes that fine-grained permission controls to shared service resource, including spatially and in figure layer Permission control.
The second object of the present invention is to provide a kind of electronic equipment, dynamic it is thin to being realized to shared service resource The permission of granularity controls, including spatially controlling with the permission in figure layer.
The third object of the present invention is to provide a kind of computer readable storage medium, dynamic to shared service Resource realizes fine-grained permission control, including spatially controlling with the permission in figure layer.
An object of the present invention adopts the following technical scheme that realization:
A kind of transmission control method of service hierarchy classification, includes the following steps
Receiving step: the service request that user terminal is sent is received;
Service processing step: service processing is carried out according to service request to obtain service request result, service processing includes clothes Business is split, and service fractionation splits and/or services figure layer including service clearance and splits;
Feedback step: service request result is fed back into user terminal.
Further, further include authentication step after the receiving step, the authentication step the following steps are included:
Whether judgement has access authority with the associated subscriber identity information of service request, if it is, carrying out in next step Processing, if it is not, then interrupting this calling, feeds back the status information of unauthorized to user terminal.
Further, subscriber identity information is obtained by following steps in the authentication step:
It sends token application and carries out safety verification to authentication server, if the verification passes, then generate user identity letter Breath, and subscriber identity information is associated with service request;If authentication failed, this calling is interrupted, feeds back unauthorized state To user terminal.
Further, further include resource matched step after the receiving step, the resource matched step include with Lower step:
Whether judgement has this resource transfer qualification with the associated subscriber identity information of service request, if it is, holding Row next step returns to resource unauthorized information to user if it is not, then interrupting this calling.
Further, in the service processing step according to service request carry out service processing using service aggregating and/ Or service splits and is operated.
Further, the service aggregating mainly comprises the steps that
Service parsing is carried out to service request;
The resource data in WMTS system is transferred according to the service request after parsing;
Map overlay is carried out to the resource data being deployed into and picture is merged to generate service request result.
Further, it includes that service clearance fractionation and/service figure layer are split that the service, which is split,;
The service clearance fractionation mainly comprises the steps that
Slice corresponding with figure layer number, line number and row number is obtained according to service request;
The coordinate on four vertex of slice is calculated according to section protocol;
Judge whether four vertex of slice are arranged in corresponding barrier range;
Slice is handled to obtain service request result according to judging result;
The service figure layer fractionation mainly comprises the steps that
Service parsing is carried out to service request;
According to figure layer mapping relations, judge whether corresponding figure layer is included within the scope of user right, if part figure layer exists In the extent of competence of user, then figure layer is split, the figure layer belonged within the scope of user right is returned, if the figure layer of application It is not included in the extent of competence of user, does not then return to figure layer.
Further, in service clearance splitting step, judge whether four vertex of slice are arranged in corresponding boundary line Judged in range using injection collimation method.
The second object of the present invention adopts the following technical scheme that realization:
A kind of electronic equipment can be run on a memory and on a processor including memory, processor and storage Computer program, the processor realize clothes described in any one of one of the object of the invention when executing the computer program It is engaged in transmission control method at different levels.
The third object of the present invention adopts the following technical scheme that realization:
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The transmission control method of the service hierarchy classification as described in any one of one of the object of the invention is realized when row.
Compared with prior art, the beneficial effects of the present invention are:
The transmission control method of service hierarchy classification of the invention is according to the permission of user, dynamically to shared service resource Fine-grained permission control is realized, including the permission control on spatially (such as administrative region) and figure layer.
Detailed description of the invention
Fig. 1 is the flow chart of the transmission control method of the service hierarchy classification in embodiment one;
Fig. 2 is the integrated stand composition of the transmission control system of the service hierarchy classification in embodiment one;
Fig. 3 is the flow chart of the authentication step in embodiment one;
Fig. 4 is the flow chart of the service aggregating step in embodiment one;
Fig. 5 is the overall flow figure of the service aggregating step in embodiment one;
Fig. 6 is the flow chart that the service clearance in embodiment one is split;
Fig. 7 is the overall flow figure that the service clearance in embodiment one is split;
Fig. 8 is the flow chart of the slicing treatment step in embodiment one;
Fig. 9 is the responding process figure of the service clearance splitting step in embodiment one;
Figure 10 is that the spatial dimension in embodiment one splits instance graph one;
Figure 11 is that the spatial dimension in embodiment one splits instance graph two;
Figure 12 is that the spatial dimension in embodiment one splits instance graph three;
Figure 13 is that the spatial dimension in embodiment one splits instance graph four;
Figure 14 is the lead determining method exemplary diagram in embodiment one;
Figure 15 is the flow chart of the service figure layer splitting step in embodiment one;
Figure 16 is the example one of the service figure layer splitting step in embodiment one;
Figure 17 is the example two of the service figure layer splitting step in embodiment one;
Figure 18 is application interface screenshot example;
Figure 19 is that the service figure layer before the fractionation in embodiment one splits screenshot one;
Figure 20 is that the service figure layer before the fractionation in embodiment one splits screenshot two;
Figure 21 is that the service figure layer after the fractionation in embodiment one splits screenshot one;
Figure 22 is that the service figure layer after the fractionation in embodiment one splits screenshot two;
Figure 23 is the screenshot one of the log recording in embodiment one;
Figure 24 is the screenshot two of the log recording in embodiment one.
Specific embodiment
In the following, being described further in conjunction with attached drawing and specific embodiment to the present invention, it should be noted that not Under the premise of conflicting, new implementation can be formed between various embodiments described below or between each technical characteristic in any combination Example.
Embodiment one
One, the service transmission control method process of service hierarchy classification
Service-Engine essence is a HTTP Reverse Proxy, and the http request of entrance is passed through in a series of Between part (Middleware) processing, including purview certification, service forwarding, service processing, the processes such as service discovery, finally by HTTP server returns to user.Entire server uses the design pattern of pipeline, and the scalability of system is strong.Middleware phase each other It is mutually independent, relevant intermediate treatment process can be added or reduced according to the needs of business.
Entire server uses the design pattern of pipeline, and the scalability of system is strong.Middleware is mutually independent, Ke Yigen According to the needs of business, relevant intermediate treatment process is added or reduced.
The design of system carries out Dynamic injection to different services by the way of relying on injection, is realized using caching mechanism Effective monitoring, record, the management of Service Instance.Its overall architecture is as shown in Figure 2:
Two, entitlement
Entitlement is injected into service-Engine as middleware, carries out safety verification and power to the request from client Limit control.For the request by safety verification, continue the processing of next step, otherwise directly interrupt this calling, return is not awarded The state of power is to client.
The authentication server secure verification servers unified as platform, preserve the essential information and power of user and resource Limit information, verifying and authorization for user.Protected object of the service-Engine as resource is associated with authentication server holding. When client is by service-Engine access platform resource, needs to obtain token from authentication server, pass through token and service-Engine Exchange resource information.
Three, resource matched
After the request through safety certification from client, engine gets what this client possessed by its token Access authorization for resource information, if the resource service of request so executes next module in the scope of resource of authorization, i.e. resource takes Business request processing.Otherwise illustrate the client within user's system of platform but there is no to requested resource authorization, This calling is then directly interrupted, returns to resource unauthorized information to client.
Four, service processing
Service aggregating: in the manufacturing process of electronic map, often electronic map (or image) and map label point Come production (slice), facilitates different special layers to be superimposed and shows.But this mode is called to front end and is made troubles, and is needed Base map and mark is requested to show that service aggregating can be well solved this problem to be superimposed simultaneously.
Multiple services (picture) are overlapped and are merged on backstage using the technology of service aggregating, are rendered to individual figure Piece is externally shown and is called in the form of a new address of service.
Service is split: service is divided into two ways, the fractionation in fractionation and figure layer spatially.Space splits (horizontal To) refer to that spatially range carries out cutting filtering for map service, forms different services.It is for one that figure layer, which splits (longitudinal direction), Service is there are in the case where multiple figure layers, and original service itself is there is also the ability that figure layer controls, as OGC WMS, The MapServer of ArcGIS is serviced, and can form the service of single figure layer by conversion and mapping in logic.In this implementation It mainly completes to realize using above-mentioned technology in example, specific embodiment is as follows.
As shown in Figure 1, present embodiments providing a kind of transmission control method of service hierarchy classification, include the following steps
S1: the service request that user terminal is sent is received;When carrying out service request, user can be according to the actual situation The permission for making requests, but requesting should be in the due extent of competence of their own, if it exceeds the permission of oneself is then not Give display;
S11: whether judgement has access authority with the associated subscriber identity information of service request, if it is, carrying out down The processing of one step, if it is not, then interrupting this calling, feeds back the status information of unauthorized to user terminal.It is provided with carrying out authentication When carried out there are two types of mode, the first is assigned directly when user carries out account application directly to user Corresponding identity information, these identity informations include access authority, call permission and base identity information;These base identities Information includes being stated department etc..Second is temporarily to be assigned information to user when calling, as shown in figure 3, it has Body mode of operation is as follows: sending token application and carries out safety verification to authentication server, if the verification passes, then generates user Identity information, and subscriber identity information is associated with service request;If authentication failed, this calling is interrupted, feedback is not awarded Power state is to user terminal.This step primarily to verifying user whether have the permission for being able to enter the resource system, if After having, the operation of next step can be carried out.
S12: whether judgement has this resource transfer qualification with the associated subscriber identity information of service request, if so, It then performs the next step suddenly, if it is not, then interrupting this calling, returns to resource unauthorized information to user.It in this way can be further The flexibility for ensureing authority distribution, to guarantee the reasonability that resource is transferred.Although resource system can be entered in previous step user System, but due in order to guarantee that the smooth operation of system and level are clearly demarcated, it is also necessary to verify user and whether have and call resource Qualification, for example in geology bureau, chief has higher-rights, can transfer and distribute all resources, but it is other at Member is merely able to access corresponding resource, is unable to carry out integration processing to resource;The purpose for the arrangement is that in order to guarantee system Reasonability.After the request through safety certification from client, engine gets this client by its token and possesses Access authorization for resource information, if request resource service next module, i.e. resource are so executed in the scope of resource of authorization Service request handling.Otherwise illustrate the client within user's system of platform but requested resource is not awarded Power then directly interrupts this calling, returns to resource unauthorized information to client.
S2: carrying out service processing according to service request to obtain service request result, and the service processing includes that service is split, And it includes that service clearance splits and/or service figure layer fractionation that the service, which is split,;Service processing in the service processing step It further include service aggregating.
As shown in Figure 4 and Figure 5, in the manufacturing process of electronic map, often electronic map (or image) and map Mark separates production (slice), facilitates different special layers to be superimposed and shows.But this mode is called to front end and is brought not Just, it needs that base map and mark is requested to show that service aggregating can be well solved this problem to be superimposed simultaneously.
Multiple services (picture) are overlapped and are merged on backstage using the technology of service aggregating, are rendered to individual figure Piece is externally shown and is called in the form of a new address of service.The service aggregating mainly comprises the steps that
Service parsing is carried out to service request;Here service request is at least two;According to the service request after parsing Transfer the resource data in WMTS system;Map overlay is carried out to the resource data being deployed into and picture is merged and asked with generating service Seek result.
Service for user's request processes, and judges whether the service of request has polymerization.
public void MapAccess(HttpContext context)
Processing polymerization.Only one does not need to polymerize for the service of polymerization, if polymerization service have it is multiple if handle polymerization.
public Stream Run(HttpContext context)
It is thereon the specific one of specific embodiment of service.
The scope control of figure is to be divided to control according to the administrative boundary in administrative area.The range permission of the map slice of request Information can be obtained in the body of a map or chart controlled attribute for the resource information that a upper middleware is got or be carried by URL.Such as Fruit is provided with body of a map or chart controlled attribute, then engine is handled the resource after request resource returns, if the slice is complete It include entirely then to return to whole slices within configured administrative boundary;If slice a part is included within administrative boundary The slice is split, only display includes the content within administrative boundary;If not intra vires if return to blank Slice.If not doing scope control returns to whole slices.As shown in Fig. 6, Fig. 7 and Fig. 9, the service clearance splits main packet Include following steps:
Slice corresponding with figure layer number, line number and row number is obtained according to service request;By URL directly acquire figure layer number, Line number, row number;
As shown in figure 8, it is specific slicing treatment mode: calculating the seat on four vertex of slice according to section protocol Mark;Judge whether four vertex of slice are arranged in corresponding barrier range;Judge whether four vertex of slice are arranged in Judged in corresponding barrier range using injection collimation method.Wherein judge vertex position all whether setting administrative boundary What is utilized in range (polygon point set) is that injection collimation method judges that a little whether in polygon, concrete principle process is as follows: injection Collimation method: go out ray of carrying out the coffin upon burial from target point, see the intersection point number of this ray and all sides of polygon.If there is odd number is handed over Point, then explanation is in inside, and if there is even number intersection point, then explanation is in outside.
As shown in figure 14, specific practice: the Y coordinate of test point is compared with each point of polygon, can be obtained The list of the intersection point of row and polygon edge where one test point.There are 8 sides and test point institute in this example of the following figure Row intersection, and there are 6 sides not intersect.The test point is more if the number of two edge points of test point is all odd number In the shape of side, otherwise outside polygon.There are 5 intersection points on the left side of test point in this example, and there are three intersection points on the right, they are all It is odd number, so point is in polygon.
Wherein the specific example of slicing treatment mode is as follows:
// judge whether the slice needs to cut out
public bool CheckServiceExtent(ServiceModel istm,Bbox bbox,ref bool fullContain,ref List<Bbox>polygonBbox,ref List<RangeModel>resultRanges)
//MapServer type slicing treatment middleware
MapServerTProxyMiddleware(Invoke)
// slice forward process function
static async Task<int>WebRequest(string url,IOwinContext context,Lrc tileLrc,List<Bbox>polygonBox,List<RangeModel>resultRanges,string innerUrl, string baseReplaceUrl)
Slice is handled to obtain service request result according to judging result;
Service for application is parsed, and judges the figure layer of application, and engine gets this client by its token and gathers around Some access authorization for resource information, the extent of competence of the correspondence user then stored according to library in data judge whether the figure layer of application wraps It is contained in the extent of competence of user.If being included within the scope of user right, the figure layer of application is returned to, if part figure layer is in user Extent of competence in, then data layer is split, by the figure layer belonged within the scope of user right return;If the figure layer of application It is not included in the extent of competence of user, does not then return to element.Above-mentioned is concrete implementation mode, in the actual operation process Situation, as shown in Figure 10, Figure 11, Figure 12 and Figure 13;It is capable of the result of visual pattern finding out space and splitting.
As shown in Figure 15, Figure 16 and Figure 17, the service figure layer fractionation is mainly comprised the steps that
Service parsing is carried out to service request;
According to figure layer mapping relations, judge whether corresponding figure layer is included within the scope of user right, if part figure layer exists In the extent of competence of user, then figure layer is split, the figure layer belonged within the scope of user right is returned, if the figure layer of application It is not included in the extent of competence of user, does not then return to figure layer.It is specific as follows to carry out the mode that service figure layer is split:
public void MapAccess(HttpContext context)
Construction splits the parameter of service, according to different requests the different parameter of type structure.
The result returned for request processes, and different processing is done according to different types.
public RequestParam GetConstructMapUrl(HttpAccess ha,string extra, string param,string result)private long MapServerRequestHandler(string url, string tokens,HttpAccess httpAccess,HttpContext context,RequestParam r)
Such as Figure 18, it is specific application interface, can select corresponding service operations according to the interface.Figure 19, Figure 20, Figure 21 and Figure 22 be split front and back both comparison diagram, by the comparison diagram be capable of ocular and clear find out experience service split before The difference of the two afterwards.
S3: service request result is fed back into user terminal.The design of system is by the way of relying on injection to different clothes Business carries out Dynamic injection, and effective monitoring, record, the management of Service Instance are realized using caching mechanism.Specific log recording is such as Shown in Figure 23 and Figure 24.
According to the permission of user, fine-grained permission, which controls, dynamically to be realized to shared service resource, including spatially (example Such as administrative region) and figure layer on permission control.For example, by the Map Services resource-sharing of some specific region to user, or Person will specify figure layer to share to user in some Service Source.And it is big to solve server stress, easily lead to service blocking with And the possibility of service-Engine paralysis.Multi-layer image, multidata forwarding are avoided, server stress is alleviated, service is improved and turns Send out speed and efficiency
Embodiment two
Embodiment two discloses a kind of electronic equipment, which includes processor, memory and program, wherein locating One or more can be used in reason device and memory, and program is stored in memory, and is configured to be executed by processor, When processor executes the program, the transmission control method of the service hierarchy classification of embodiment one is realized.The electronic equipment can be The a series of electronic equipment of mobile phone, computer, tablet computer etc..
Embodiment three
Embodiment three discloses a kind of computer readable storage medium, and the storage medium is for storing program, and the journey When sequence is executed by processor, the transmission control method of the service hierarchy classification of embodiment one is realized.
Certainly, a kind of storage medium comprising computer executable instructions, computer provided by the embodiment of the present invention The method operation that executable instruction is not limited to the described above, can also be performed in method provided by any embodiment of the invention Relevant operation.
By the description above with respect to embodiment, it is apparent to those skilled in the art that, the present invention It can be realized by software and required common hardware, naturally it is also possible to which by hardware realization, but in many cases, the former is more Good embodiment.Based on this understanding, technical solution of the present invention substantially in other words contributes to the prior art Part can be embodied in the form of software products, which can store in computer readable storage medium In, floppy disk, read-only memory (Read-Only Memory, ROM), random access memory (Random such as computer Access Memory, RAM), flash memory (FLASH), hard disk or CD etc., including some instructions use so that an electronic equipment (can be personal computer, server or the network equipment etc.) executes method described in each embodiment of the present invention.
It is worth noting that, in the above-mentioned embodiment based on content update notice device, included each unit and mould Block is only divided according to the functional logic, but is not limited to the above division, and is as long as corresponding functions can be realized It can;In addition, the specific name of each functional unit is also only for convenience of distinguishing each other, the protection model being not intended to restrict the invention It encloses.
The above embodiment is only the preferred embodiment of the present invention, and the scope of protection of the present invention is not limited thereto, The variation and replacement for any unsubstantiality that those skilled in the art is done on the basis of the present invention belong to institute of the present invention Claimed range.

Claims (10)

1. a kind of transmission control method of service hierarchy classification, which is characterized in that include the following steps
Receiving step: the service request that user terminal is sent is received;
Service processing step: service processing is carried out according to service request to obtain service request result, the service processing includes clothes Business is split, and service fractionation splits and/or services figure layer including service clearance and splits;
Feedback step: service request result is fed back into user terminal.
2. the transmission control method of service hierarchy as described in claim 1 classification, which is characterized in that the receiving step it After further include authentication step, the authentication step the following steps are included:
Whether judgement has access authority with the associated subscriber identity information of service request, if it is, be further processed, If it is not, then interrupting this calling, the status information of unauthorized is fed back to user terminal.
3. the transmission control method of service hierarchy classification as claimed in claim 2, which is characterized in that used in the authentication step Family identity information is obtained by following steps:
It sends token application and carries out safety verification to authentication server, if the verification passes, then generate subscriber identity information, and Subscriber identity information is associated with service request;If authentication failed, this calling, feedback unauthorized state to user are interrupted End.
4. the transmission control method that the service hierarchy as described in any one of claim 1-3 is classified, which is characterized in that in institute Stating after receiving step further includes resource matched step, the resource matched step the following steps are included:
Whether judgement has this resource transfer qualification with the associated subscriber identity information of service request, if it is, under executing One step returns to resource unauthorized information to user if it is not, then interrupting this calling.
5. the transmission control method of service hierarchy classification as described in claim 1, which is characterized in that the service processing step In service processing further include service aggregating.
6. the transmission control method of service hierarchy classification as claimed in claim 5, which is characterized in that the service aggregating is main The following steps are included:
Service parsing is carried out to service request;
The resource data in WMTS system is transferred according to the service request after parsing;
Map overlay is carried out to the resource data being deployed into and picture is merged to generate service request result.
7. the transmission control method of service hierarchy classification as described in claim 1, which is characterized in that
The service clearance fractionation mainly comprises the steps that
Slice corresponding with figure layer number, line number and row number is obtained according to service request;
The coordinate on four vertex of slice is calculated according to section protocol;
Judge whether four vertex of slice are arranged in corresponding barrier range;
Slice is handled to obtain service request result according to judging result;
The service figure layer fractionation mainly comprises the steps that
Service parsing is carried out to service request;
According to figure layer mapping relations, judge whether corresponding figure layer is included within the scope of user right, if part figure layer is in user Extent of competence in, then figure layer is split, by the figure layer belonged within the scope of user right return, if application figure layer do not wrap It is contained in the extent of competence of user, does not then return to figure layer.
8. the transmission control method of service hierarchy classification as claimed in claim 7, which is characterized in that split and walk in service clearance In rapid, judge whether four vertex of slice are arranged in corresponding barrier range and judged using injection collimation method.
9. a kind of electronic equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, which is characterized in that the processor realizes any one of claim 1-8 institute when executing the computer program The transmission control method for the service hierarchy classification stated.
10. a kind of computer readable storage medium, is stored thereon with computer program, it is characterised in that: the computer program The transmission control method of the service hierarchy classification as described in claim 1-8 any one is realized when being executed by processor.
CN201810987401.9A 2018-08-28 2018-08-28 A kind of transmission control method and device of service hierarchy classification Pending CN109040106A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810987401.9A CN109040106A (en) 2018-08-28 2018-08-28 A kind of transmission control method and device of service hierarchy classification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810987401.9A CN109040106A (en) 2018-08-28 2018-08-28 A kind of transmission control method and device of service hierarchy classification

Publications (1)

Publication Number Publication Date
CN109040106A true CN109040106A (en) 2018-12-18

Family

ID=64625559

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810987401.9A Pending CN109040106A (en) 2018-08-28 2018-08-28 A kind of transmission control method and device of service hierarchy classification

Country Status (1)

Country Link
CN (1) CN109040106A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110636341A (en) * 2019-10-25 2019-12-31 四川虹魔方网络科技有限公司 Large-concurrency supporting multi-level fine-grained caching mechanism launcher interface optimization method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101087187A (en) * 2007-05-22 2007-12-12 网御神州科技(北京)有限公司 A method and device for secure access control based on user
CN101729403A (en) * 2009-12-10 2010-06-09 上海电机学院 Access control method based on attribute and rule
KR20110119021A (en) * 2010-04-26 2011-11-02 주식회사 에스원 A setting method of digital-map for region rating
CN102968442A (en) * 2012-10-22 2013-03-13 武大吉奥信息技术有限公司 Network map tile service aggregation method and system
CN103049549A (en) * 2012-12-27 2013-04-17 国家海洋信息中心 Island data management method and system
CN105185222A (en) * 2015-09-24 2015-12-23 百度在线网络技术(北京)有限公司 Method and apparatus for rendering and showing maps
CN105915535A (en) * 2016-05-24 2016-08-31 北京朋创天地科技有限公司 Virtual resource access control method based on user identity
CN107291829A (en) * 2017-05-27 2017-10-24 西安未来国际信息股份有限公司 A kind of information resource authority limits managing method based on LBS

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101087187A (en) * 2007-05-22 2007-12-12 网御神州科技(北京)有限公司 A method and device for secure access control based on user
CN101729403A (en) * 2009-12-10 2010-06-09 上海电机学院 Access control method based on attribute and rule
KR20110119021A (en) * 2010-04-26 2011-11-02 주식회사 에스원 A setting method of digital-map for region rating
CN102968442A (en) * 2012-10-22 2013-03-13 武大吉奥信息技术有限公司 Network map tile service aggregation method and system
CN103049549A (en) * 2012-12-27 2013-04-17 国家海洋信息中心 Island data management method and system
CN105185222A (en) * 2015-09-24 2015-12-23 百度在线网络技术(北京)有限公司 Method and apparatus for rendering and showing maps
CN105915535A (en) * 2016-05-24 2016-08-31 北京朋创天地科技有限公司 Virtual resource access control method based on user identity
CN107291829A (en) * 2017-05-27 2017-10-24 西安未来国际信息股份有限公司 A kind of information resource authority limits managing method based on LBS

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110636341A (en) * 2019-10-25 2019-12-31 四川虹魔方网络科技有限公司 Large-concurrency supporting multi-level fine-grained caching mechanism launcher interface optimization method
CN110636341B (en) * 2019-10-25 2021-11-09 四川虹魔方网络科技有限公司 Large-concurrency supporting multi-level fine-grained caching mechanism launcher interface optimization method

Similar Documents

Publication Publication Date Title
US10965772B2 (en) Interface invocation method and apparatus for hybrid cloud
US10708289B2 (en) Secured event monitoring leveraging blockchain
CA3025198C (en) Tenant-aware distributed application authentication
CN102843366B (en) A kind of network resource accession authority control method and device
CN111191210B (en) Method and device for controlling data access authority, computer equipment and storage medium
CN108200146B (en) Method for realizing lightweight microservice architecture
US8590003B2 (en) Controlling access to resources by hosted entities
EP2807814B1 (en) Document communication runtime interfaces
CN104168333B (en) The working method of PROXZONE service platforms
CN103490886B (en) The verification method of permissions data, apparatus and system
AU2012315674B9 (en) Parameter based key derivation
CN102947797A (en) Online service access controls using scale out directory features
CN107196951A (en) The implementation method and firewall system of a kind of HDFS systems fire wall
US8694993B1 (en) Virtualization platform for secured communications between a user device and an application server
CN101729541A (en) Method and system for accessing resources of multi-service platform
CN106021375B (en) Data bank access method and database broker node
US8812631B2 (en) Method and arrangement for operating a computer cluster
CN108805516A (en) A kind of mobile office system based on ERP
CN109783595B (en) Routing and distribution method of loose sliced map service
CN110390209A (en) Creation data access method and device
CN109040106A (en) A kind of transmission control method and device of service hierarchy classification
US20230368191A1 (en) Database representation of a public trust ledger
Kumar et al. Real geo‐time‐based secured access computation model for e‐Health systems
CN115603958A (en) Login data processing method and device, computer equipment and storage medium
US12039496B2 (en) Tenant data residency requirements enforcement in multitenant collaborative work environments

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181218

RJ01 Rejection of invention patent application after publication